CVE-2025-38273
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | From 6.14.9 (inc) to 6.15 (inc) |
| linux | linux_kernel | 5.10.238 |
| linux | linux_kernel | 5.15.185 |
| linux | linux_kernel | 6.1.141 |
| linux | linux_kernel | 6.6.93 |
| debian | debian_linux | 11.0 |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a refcount warning in the Linux kernel's TIPC (Transparent Inter-Process Communication) subsystem. It occurs because the function get_net() is called on a network namespace that is in the process of being destroyed, which means its reference count is zero. This leads to a use-after-free warning when a TIPC discovery timer fires during network namespace cleanup. The fix replaces get_net() with maybe_get_net(), which safely checks the reference count before incrementing it, preventing the use-after-free condition.
How can this vulnerability impact me? :
The vulnerability can lead to a use-after-free condition in the Linux kernel's networking code, which may cause kernel warnings or instability. While the description does not explicitly mention exploitation or direct security impact, use-after-free issues can potentially lead to crashes or undefined behavior in the kernel, possibly affecting system reliability or security.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by replacing the get_net() call with maybe_get_net(), which safely checks the network namespace reference count before incrementing it. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix (post commit e279024617134).